Lynda - Techniques for Developing Secure Software/01. Introduction/01_01-Welcome.mp4 |
3.4 MB |
Lynda - Techniques for Developing Secure Software/02. Understanding Software Security/02_01-What is software security.mp4 |
2.6 MB |
Lynda - Techniques for Developing Secure Software/02. Understanding Software Security/02_02-Significance of software security.mp4 |
5 MB |
Lynda - Techniques for Developing Secure Software/02. Understanding Software Security/02_03-Software security vocabulary.mp4 |
2.9 MB |
Lynda - Techniques for Developing Secure Software/02. Understanding Software Security/02_04-Software security risk management.mp4 |
3.7 MB |
Lynda - Techniques for Developing Secure Software/02. Understanding Software Security/02_05-Software security resources.mp4 |
4.3 MB |
Lynda - Techniques for Developing Secure Software/03. Software Security Threats/03_01-Hardwarelevel threats.mp4 |
4.4 MB |
Lynda - Techniques for Developing Secure Software/03. Software Security Threats/03_02-Codelevel threats.mp4 |
4.1 MB |
Lynda - Techniques for Developing Secure Software/03. Software Security Threats/03_03-Detailed designlevel threats.mp4 |
4.7 MB |
Lynda - Techniques for Developing Secure Software/03. Software Security Threats/03_04-Architecturallevel threats.mp4 |
4.8 MB |
Lynda - Techniques for Developing Secure Software/03. Software Security Threats/03_05-Requirementslevel threats.mp4 |
4 MB |
Lynda - Techniques for Developing Secure Software/03. Software Security Threats/03_06-Threat modeling and tools.mp4 |
3.8 MB |
Lynda - Techniques for Developing Secure Software/04. Secure Software Design/04_01-Introduction to secure design.mp4 |
4.4 MB |
Lynda - Techniques for Developing Secure Software/04. Secure Software Design/04_02-Security tactics.mp4 |
3.8 MB |
Lynda - Techniques for Developing Secure Software/04. Secure Software Design/04_03-Security patterns.mp4 |
4.3 MB |
Lynda - Techniques for Developing Secure Software/04. Secure Software Design/04_04-Security vulnerabilities.mp4 |
5.2 MB |
Lynda - Techniques for Developing Secure Software/04. Secure Software Design/04_05-Architectural analysis for security.mp4 |
5.1 MB |
Lynda - Techniques for Developing Secure Software/04. Secure Software Design/04_06-Case study Setting the Stage.mp4 |
1.5 MB |
Lynda - Techniques for Developing Secure Software/04. Secure Software Design/04_07-Case study TacticOriented Architectural Analysis.mp4 |
4 MB |
Lynda - Techniques for Developing Secure Software/04. Secure Software Design/04_08-Case study PatternOriented Architectural Analysis.mp4 |
6 MB |
Lynda - Techniques for Developing Secure Software/04. Secure Software Design/04_09-Case study VulnerabilityOriented Architectural Analysis.mp4 |
4.5 MB |
Lynda - Techniques for Developing Secure Software/04. Secure Software Design/04_10-Software security antipatterns.mp4 |
5.2 MB |
Lynda - Techniques for Developing Secure Software/05. Secure Coding/05_01-Introduction to secure coding.mp4 |
3.2 MB |
Lynda - Techniques for Developing Secure Software/05. Secure Coding/05_02-Buffer overflow attacks.mp4 |
4.6 MB |
Lynda - Techniques for Developing Secure Software/05. Secure Coding/05_03-Buffer overflow countermeasures.mp4 |
4.9 MB |
Lynda - Techniques for Developing Secure Software/05. Secure Coding/05_04-Broken authentication and session management.mp4 |
3 MB |
Lynda - Techniques for Developing Secure Software/05. Secure Coding/05_05-Broken authentication and session management countermeasures.mp4 |
5.6 MB |
Lynda - Techniques for Developing Secure Software/05. Secure Coding/05_06-Insecure direct object references.mp4 |
3.8 MB |
Lynda - Techniques for Developing Secure Software/05. Secure Coding/05_07-Insecure direct object references countermeasures.mp4 |
2.2 MB |
Lynda - Techniques for Developing Secure Software/05. Secure Coding/05_08-Sensitive information exposure.mp4 |
3 MB |
Lynda - Techniques for Developing Secure Software/05. Secure Coding/05_09-Sensitive data exposure countermeasures.mp4 |
4.1 MB |
Lynda - Techniques for Developing Secure Software/05. Secure Coding/05_10-Other secure coding best practices.mp4 |
6 MB |
Lynda - Techniques for Developing Secure Software/06. Testing for Security/06_01-Testing for security.mp4 |
3.1 MB |
Lynda - Techniques for Developing Secure Software/06. Testing for Security/06_02-Static analysis.mp4 |
4.6 MB |
Lynda - Techniques for Developing Secure Software/06. Testing for Security/06_03-Exploring tools for static analysis.mp4 |
4.5 MB |
Lynda - Techniques for Developing Secure Software/06. Testing for Security/06_04-Dynamic analysis.mp4 |
4.2 MB |
Lynda - Techniques for Developing Secure Software/06. Testing for Security/06_05-Exploring tools for dynamic analysis.mp4 |
4.1 MB |
Lynda - Techniques for Developing Secure Software/06. Testing for Security/06_06-Penetration testing.mp4 |
4.1 MB |
Lynda - Techniques for Developing Secure Software/06. Testing for Security/06_07-Exploring tools for penetration testing.mp4 |
2.3 MB |
Lynda - Techniques for Developing Secure Software/06. Testing for Security/06_08-Vulnerability management.mp4 |
4.5 MB |
Lynda - Techniques for Developing Secure Software/06. Testing for Security/06_09-Exploring tools for vulnerabilty management.mp4 |
1.3 MB |
Lynda - Techniques for Developing Secure Software/07. Conclusion/07_01-Next steps.mp4 |
2.2 MB |